pivotalsoftware spring-batch CVE-2020-5411 is a vulnerability in Pivotal Software Spring Batch
Published on June 11, 2020

Jackson Configuration Allows Code Execution with Unknown "Serialization Gadgets"
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing.

NVD

Weakness Type

What is a Marshaling, Unmarshaling Vulnerability?

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE-2020-5411 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.


Products Associated with CVE-2020-5411

Want to know whenever a new CVE is published for Pivotal Software Spring Batch? stack.watch will email you.

 

Affected Versions

Spring by VMware Spring Batch:

Exploit Probability

EPSS
0.81%
Percentile
73.87%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.